AN EXPLORATION & ANALYSIS OF COMMON FEATURE EXTRACTION USING THE PERIOCULAR REGION
|
|
- Tamsin Johns
- 5 years ago
- Views:
Transcription
1 AN EXPLORATION & ANALYSIS OF COMMON FEATURE EXTRACTION USING THE PERIOCULAR REGION Nirgish Kumar,¹ Dr. Vivek Srivastava², Komal Nirgish ³ Research Scholar, Faculty of Engineering, Rama University, Kanpur 1,3 Dean, Faculty of Engineering, Rama University, Kanpur² Abstract: The periocular region is collected with the iris and may be used as a substitute once the iris is clearly obscured. The periocular region are often seen as a sub-region of the face. Therefore, one may expect common facial feature extraction algorithms to supply discriminative feature sets from the per ocular region as they are doing from the face. However, the degree of discrimination of per ocular options remains to be seen. They conjointly counsel that the per ocular region may well be nearly as discriminative because the entire face. Sadly, the experiments performed in those works were rudimentary. The common biometric authentication information and customary facial feature extraction algorithms as they're enforced in an exceedingly per ocular-based biometric system. The face and periocular region the foremost discriminative options area unit extracted, and assess the strength of the periocular region with relevance the environment-influenced considerations a periocular-based biometric system can seemingly encounter. Keywords: Peirocular, Feature extraction, discrimination, conjointly, authentication, Grand Challenge, victimization I INTRODUCTION Though a per ocular primarily based biometric experiment are often shown to possess similar performance to a facebased biometric experiment, there's still reason to explore why this may be the case. An in depth checks out the options themselves and also the patterns they turn out within the face and per ocular region got to be performed. The standard of information plays associate degree potent role within the performance of biometric recognition systems. Early analysis of in style modalities, cherish the face and iris, use top quality information in affected environments.as expected, techniques tested below these constraints yield higher performance than once victimization quality information. Situations exist wherever top quality information are often no heritable dependably in real-world applications; however, several others exist wherever reliable information assortment isn't potential. Reacquiring biometric information once the primary acquisition yields poor quality information isn't forever potential, thus analysis is required to form non ideal information helpful. Non-ideal information are often characterized by subject-influence or environment-influence. However, subject influenced considerations aren't freelance of environment-influenced considerations; environmentinfluenced concerns can seemingly seem insure subjectinfluenced non-ideal information. If a subject matter is actively attempting to avoid biometric recognition by concealing their face or deed from the camera then the environment-influenced considerations of blur and inconsistent image resolution can seemingly be gift. Figure 1: An example recording session from FRGC [21]. II DATA Two completely different datasets were elite to be used during this chapter: The biometric authentication Grand Challenge (FRGC) info and also the biometric authentication Technology (FERET) info. The FRGC info [21] consists of high resolution color pictures of an oversized variety of subjects largely between ages eighteen and twenty two, collected over a 2 year amount from multiple recording sessions involving controlled and uncontrolled lighting conditions, associate degree with an expression and while 23
2 not. A recording session is that the set of all pictures of a subject matter taken every time the subject s biometric information is collected. A typical FRGC recording session consists of 4 frontal faces, controlled lighting still pictures, 2 frontal faces, uncontrolled lighting still pictures, and one three-dimensional image. Figure 2.1 shows a group of controlled lighting pictures for one recording session. The controlled lighting pictures were taken in an exceedingly studio setting (two or 3 studio lights) and with 2 facial expressions (smiling and neutral). In controlled conditions, the space between the topic and also the camera is around identical. The still pictures were soft on a four Megapixel Canon Power Shot G2 and have a constituent resolution of either or pixels. The pictures area unit holds on in JPEG format with storage sizes starting from one.2 Mbytes to three.1 Mbytes. FRGC Experiment one is associate degree experimental protocol and information set that's wide won t to compare completely different biometric recognition ways. FRGC Experiment one could be a set of sixteen, 029 still, high resolution, and frontal face pictures taken below controlled lighting conditions. It had been chosen for this work as a result of {the massive the massive the big} face pictures can cause comparatively large per ocular region pictures. FRGC Experiment one measures performance on the Figure 2: Demographics of FRGC validation partition by (a) race, (b) age, and (c) sex [21]. III METHODOLOGY The essential biometric experiment temple followed by all experiments during this chapter consists of the subsequent steps: information preprocessing, testing/training partitioning, gallery/probe partitioning, feature extraction, feature comparison, and computation of performance statistics.. Figure 3: Example images from the FERET database [22] Figure 4: The flow of preprocessing steps applied to a face image to extract its periocular regions IV DATA PREPROCESSING Geometric Normalization The primary step in preprocessing a facial biometric image is geometric standardization that aligns all of the pictures within the dataset to identical special coordinates. A picture of a face are often turned on 3 axes: associate degree axis from the face to the observer (in-plane rotation), a vertical axis dissecting the face rotation and a horizontal axis dissecting the face out-of-plane. The foremost ordinarily used points to correct in-plane rotation in facial pictures area unit the attention centers. Thus the placement of the attention centers should be celebrated to perform correction. Eye center locations for FRGC and FERET were provided by the curators of the databases. Periocular Region Extraction The next preprocessing step is to extract per ocular region pictures from normalized and equalized facial pictures. This can be accomplished by putting a sq. Bounding box around every eye, targeted on the post geometric standardization eye center locations. The length of the edges of this sq. Bounding box is adequate to the space between the 2 eye center coordinates, conjointly referred to as the lay to rest ocular distance. In a median face, one bounding box can cowl the region from the middle of the face to the ear and from all-time low of the nose to the center of the forehead. The ensuing per ocular pictures area unit then re-sized to pixels to be used within the experiments of this chapter pixels were chosen as a result of it's the dimensions of the littlest per ocular region extracted from the face pictures employed in this chapter. Histogram Equalization The last step is bar graph feat, wherever the distinction of the image is increased. This step normalizes the relative illumination levels between pictures by everchanging constituent intensity values. The bins of a bar graph 24
3 of a picture that has been equalized can contain around identical variety of pixels. This method ensures that pictures that area unit darker or lighter than a neutral image area unit altered in order that they seem to possess been taken below identical lighting conditions. The additive distribution perform (CDF) of a bar graph is outlined because the additive add of the values of the bins of a bar graph. A remodel is made which will turn out a replacement image specified the CDF of that new image is around linear. The applying of this remodel to the first image leads to a picture with associate degree equalized bar graph. V ATTRIBUTE EXTRACTION The attribute feature extraction step within the basic biometric experiment is that the main purpose of distinction between any 2 completely different experiments during this thesis. Options area unit extracted from every image within the dataset and from every partition within the set. Every feature extraction technique transforms a 2 dimensional image into a 1dimensional feature vector through its own distinctive method. The per ocular region is basically a subpart of the face; thus, it ought to be expected that common facial feature representations would offer a helpful means that of classifying people victimization the per ocular region. Categories of facial feature representations embrace native look, key point-based, and holistic. The experiments during this chapter can use basic approaches from every category of feature representations in a shot to produce comparisons between the power of the categories of feature representations to supply discriminating options from the per ocular region alone. Among the native appearance-based feature representations area unit Local Binary Patterns (LBP), Histogram of orientating Gradients (HOG), native part quantization (LPQ), and Weber native Descriptor (WLD). Scale Invariant Feature remodel (SIFT) and accelerated strong options (SURF) were chosen because the key pointbased representations. Local Appearance-Based Approaches Local Appearance-Based Feature Extraction ways area unit a category of feature extraction techniques that accumulate statistics at intervals native neighborhoods around every constituent of a picture. These statistics embrace the occurrences of sure textures, patterns, and data and area unit usually hold on in an exceedingly one-dimensional feature vector. These experiments create use of 4 native appearancebased feature extraction methods: native Binary Patterns, bar graph of orientating Gradients, native part quantization, and Weber native Descriptors. There is a unit some variations within the manner these forms of options area unit employed in biometric applications, as hostile texture classification. Local Binary Patterns Local Binary patterns (LBP) could be a texture classification methodology that was developed by Ojala et al. [16]. LBP accumulates texture data from a picture into a feature vector. This can be accomplished by labeling constituents with a binary variety that's a perform of putting a threshold on the neighborhood around every pixel. A bar graph of those values becomes the output feature vector. Because of the success of lapis a texture classification methodology, it's been used extensively for each biometric authentication [1, 31, 23, 4, and 26] and per ocular recognition [19, 16, 15,3, 29, 28, 18, 10, 8, 9, 11, 12, 14, 13, and 25]. Histogram of Oriented Gradients Histograph of orientating Gradients (HOG) is a grip and gradient primarily based feature descriptor originally developed by Dalai and Trigs to observe humans in pictures. HOG could be a native appearance-based approach that counts the occurrences of various gradient orientations in localized parts of a picture. Despite the fact that HOG was originally meant for object detection, it's been used for each facial and per ocular recognition [19, 18, 24, 13, 26, and 5]. HOG could be a easy technique that, with the exception of object orientation, is invariant to geometric and photometrical transformation. A changed HOG rule is employed for extracting options from the per ocular region. Local Phase Quantization Local Phase Quantization (LPQ) could be a consistency descriptor recently bestowed by Ojansivu et al. [28]. This methodology quantizes the part data of a separate Fourier remodel (DFT) in patch-sized neighborhoods of a picture. The most strength of this native appearance-based feature extraction methodology is that it's projected to be strong to image blurring. Though' originally used for texture classification within the presence of blur, LPQ has conjointly been used for biometric authentication [2]. Like LBP and HOG, the ensuing LPQ codes area unit compiled into a bar graph. The ultimate LPQ code could be a 256 bin bar graph wherever the quintal DFT part coefficients area unit accumulated once binary writing Weber Local Descriptor Weber Local Descriptor (WLD) could be a texture descriptor developed by Chen et al.[8]. It had been impressed by Weber s Law, a psychological law that refers to the perception of amendment in an exceedingly signal. The law states that the amendment in an exceedingly signal which will be simply noticeable is proportional to the magnitude of the first signal. WLD cares with the magnitude relation between the intensity price of a constituent and also the relative intensity variations of the constituent to its neighbors, conjointly referred to as the differential excitation, and also the gradient 25
4 direction of a constituent. Chen et al. At first used it for texture classification and face detection. Key point-based Approaches Key point-based Approaches area unit the category of feature extraction techniques that notice interest points at intervals a picture. These interest points area units usually maxima or minima of filter responses applied to the image. 2 completely different key point-based approaches area unit employed in this thesis. These approaches area unit Scale Invariant Feature remodel (SIFT) and accelerated strong options (SURF). Scale Invariant Feature remodel Lowe [19], the developer of Scale Invariant Feature Transform(SIFT),states that SIFT is associate degree approach for police work and extracting native feature descriptors that area unit moderately invariant to changes in illumination, image noise, rotation, scaling and tiny changes in viewpoint. Interest points generated by the SIFT technique correspond to native extreme a of distinction of Gaussians (dog) filters at variable scales. It had been originally developed to be employed in image matching issues and is reportable to be invariant to uniform scaling, orientation, and part invariant to affine distortion and illumination changes. For every key purpose location, the key purpose descriptor is outlined as a bar graph of orientations weighted by the gradient magnitude computed from a neighborhood window of 8 8 pixels round the key purpose location. SIFT has been used varied times for biometric authentication [4, 20, 17] and per ocular recognition [19, 18, 20, 24, 25, 27]. Accelerated strong options Originally impressed by SIFT, accelerated strong Feature (SURF) descriptors are a well-liked key point-based methodology. It had been developed by Bay et al. And claims to be quicker and a lot of strong to completely different transforms of a picture than SIFT. SURF key points area unit found from maxima within the determinant of the boot matrix of pictures, a matrix created from the convolution of the mathematician second order derivatives with the image. Alongside the key point s locations, associate degree orientation is assigned to the purpose and also the descriptor is predicated on the add of Haar moving ridge responses. SURF was originally used for beholding and has conjointly been employed in biometric authentication contexts over the years [6, 7, and 30]. Holistic Approaches Chemist faces is may be the foremost ordinarily celebrated biometric authentication rule [32]. It uses the mathematical procedure of principle part analysis to supply a low-dimensional illustration of a face from a group of higherdimensional coaching pictures. In contrast to the opposite algorithms, chemist faces could be a holistic approach to feature illustration as a result of it considers the full face promptly. VI FEATURE COMPARISON AND COMPUTATION OF PERFORMANCE STATISTICS The FRGC experimental protocol suggests the utilization of distance measure to work out the similarity between 2 feature vectors. 2 completely different feature vectors with the nearest live of distinction at intervals a group of vectors area unit same to be the nearest match. In associate degree identification experiment the feature vector of a look Focus difference range True False matches ,762 matches 135,590, ,376 79,650, ,890 29,765, ,068 8,333, ,486 2,087, , , , , image is compared to each feature vector within the gallery set and also the Top-N results area unit came back. In an exceedingly verification experiment the feature vector of a look image is compared to each feature vector within the gallery set and people that area unit on top of a threshold area unit declared to be a match. The results reportable for every experiment during this thesis area unit generated victimization town block distance metric wherever p and alphabetic character area unit feature vectors extracted from 2 pictures that have a feature spatiality of n Table 1: Focus metric differences between images. There area unit different ways that of scrutiny options that might seemingly give higher performance, cherish employing a trained classifier sort of a Support Vector Machine (SVM). VII PERFORMANCE ANALYSIS CONCERNS A variety of things will cause associate degree unfocused image. The standard of the image can suffer if the camera is unsteady once the image is captured, the topic moves out of the main focus space of the camera, or the topic is moving quicker than the camera s shutter speed permits. A very important side in any biometric recognition system is strength to variable focus. The experiments during this chapter value focus within the following manner. The Fourier energy spectrum is often wont to quantify the extent of focus of a picture pictures 26
5 Figure 5 : A comparison of unfocused images and their focus metrics. From left to right: Un-deteriorated Image (171.46), one convolution (167.25), five convolutions (161.36), ten convolutions (156.83).from the FRGC dataset have focus metrics ranging from (in focus) to (out of focus). VIII RESULTS AND DISCUSSION All of the feature illustration techniques performed thus poorly at this task that nothing are often determined supported these results. However, this can be not unexpected; of all the submissions to the meet minimum performing arts rule performed slightly worse than the HOG implementation (5.10% VR at0.1% FAR) bestowed here. Figure 6 : DET of Experiments testing uncontrolled illumination. The median performing artist was around half-hour VR at zero.1% FAR. The most effective performing arts rule had a verification rate slightly below eightieth. This rule performed this well on Experiment four solely, that suggests it had been significantly tuned to the current drawback. Sadly, it's a proprietary rule and it's not open for review. IX CONCLUSION The work bestowed during this chapter aimed to deal with 3 goals. The primary goal was to look at common biometric authentication information and customary facial feature extraction algorithms as they're enforced in an exceedingly per ocular primarily based biometric system. Experiments were conducted with seven completely different feature representations from 3 different categories of feature extraction ways. Every of the categories of feature extraction ways have a protracted history of use in biometric authentication systems. Victimization these ways, the performance of a biometric authentication system and a per ocular recognition system were compared. Establishing this baseline performance result allowed for addressing the second goal, the more exploration of wherever within the face the foremost discriminative options were found. The experiments bestowed during this chapter supported previous analysis on this question that the per ocular region is that the most discriminative region of the face. Some samples of discriminative physical options gift within the per ocular region area unit the form of the algebra, the form of the fold on top of the algebra, the presence of wrinkles round the eye, the form of the brow, the thickness of the brow, the feel of the brow, and also the texture of the skin. ACKNOWLEDGMENT The authors would like to thanks Dr.Vivek Srivastava, Dean, Faculity of Engineering, Rama University, Kanpur Prof. B.K. Tripathi, HBTU, Kanpur for his guidance in the design of several human vision experiments. REFERENCES [1] T. Ahonen, A. Hadid, and M. Pietik ainen. Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12): , [2] T. Ahonen, E. Rahtu, V. Ojansivu, and J. Heikkil a. Recognition of blurred faces using local phase quantization. In Proceedings of the International Conference on Pattern Recognition, pages 1 4, December [3] S. Bharadwaj, H. Bhatt, M. Vatsa, and R. Singh. Periocular biometrics: When iris recognition fails. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems,pages 1 6, [4] C. Chan, J. Kittler, and K. Messer. Multi-scale local binary pattern histograms for face recognition. In Advances in Biometrics, volume 4642 of Lecture Notes in Computer Science, pages Springer,2007. [5] O. D eniz, G. Bueno, J. Salido, and F. De la Torre. Face recognition using histograms of oriented gradients. Pattern Recognition Letters, 32(12): , [6] P. Dreuw, P. Steingrube, H. Hanselmann, and H. Ney. SURF-face: Face recognition under viewpoint consistency constraints. In Proceedings of the British Machine Vision Conference, pages 1 11, September [7] G. Du, F. Su, and A. Cai. Face recognition using SURF features. In Proceedings of the International Symposium on Multispectral Image Processing and Pattern Recognition, October
6 [8] K. Hollingsworth, S. Darnell, P. Miller, D. Woodard, K. Bowyer, and P. Flynn. Human and machine performance on periocular biometrics under near-infrared light and visible light. IEEE Transactions on Information Forensics and Security, 7(2): , April [9] A. Joshi, A. Gangwar, R. Sharma, and Z. Saquib. Periocular feature extraction based on LBP anddlda. In Advances in Computer Science, Engineering and Applications, volume 166 of Advances inintelligent and Soft Computing, pages Springer, [10] F. Juefei-Xu, K. Luu, M. Savvides, T. Bui, and C. Suen. Investigating age invariant face recognition based on periocular biometrics. In Proceedings of the International Joint Conference on Biometrics, pages 1 7, October [11] F. Juefei-Xu and M. Savvides. Unconstrained periocular biometric acquisition and recognition usingcots PTZ camera for uncooperative and non-cooperative subjects. In Proceedings of the IEEE Workshop on Applications of Computer Vision, pages , January [12] J. Lyle, P. Miller, S. Pundlik, and D. Woodard. Soft biometric classification using periocular regionfeatures. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, pages 1 7, [13] J. Lyle, P. Miller, S. Pundlik, and D. Woodard. Soft biometric classification using local appearance periocular region features. Pattern Recognition, 45(11): , [14] J. Merkow, B. Jou, and M. Savvides. An exploration of gender identification using only the periocular region. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, andsystems, pages 1 5, [15] P. Miller, J. Lyle, S. Pundlik, and D. Woodard. Performance evaluation of local appearance based periocular recognition. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, pages 1 6, [16] T. Ojala, M. Pietik ainen, and T. M aenp a a. Gray scale and rotation invariant texture classification with local binary patterns. In Proceedings of the European Conference on Computer Vision, pages ,Dublin, Ireland, June [17] V. Ojansivu and J. Heikkil a. Blur insensitive texture classification using local phase quantization. InProceedings of the International Conference on Image and Signal Processing, pages , July2008. [18] U. Park, R. Jillela, A. Ross, and A. Jain. Periocular biometrics in the visible spectrum. IEEE Transac- tions on Information Forensics and Security, 6(1):96 106, March [19] U. Park, A. Ross, and A.K. Jain. Periocular biometrics in the visible spectrum: A feasibility study. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, pages 1 6, September 2009 [20] V. Pauca, M. Forkin, X. Xu, R. Plemmons, and A. Ross. Challenging ocular image recognition. SensingTechnologies for Global Health, Military Medicine, Disaster Response, and Environmental Monitoring;and Biometric Technology for Human Identification VIII, 8029(1):80291V, [21] P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek.Overview of the face recognition grand challenge. In Proceedings of the IEEE Conference on ComputerVision and Pattern Recognition, pages , June [22] Y. Rodriguez and S. Marcel. Face authentication using adapted local binary pattern histograms. In Proceedings of the European Conference on Computer Vision, pages , May [23] Y. Rodriguez and S. Marcel. Face authentication using adapted local binary pattern histograms. In Proceedings of the European Conference on Computer Vision, pages , May [24] A. Ross, R. Jillela, J. Smereka, V. Boddeti, B. VijayaKumar, R. Barnard, X. Hu, P. Pauca, and R. Plemmons.Matching highly non-ideal ocular images: An information fusion approach. In Proceedings of the IAPR International Conference on Biometrics, pages , March [25] G. Santos and E. Hoyle. A fusion approach to unconstrained iris recognition. Pattern Recognition Letters, 33(8): , [26] W. Schwartz, H. Guo, and L. Davis. A robust and scalable approach to face identification. In Proceedings of the European Conference on Computer Vision, pages , [27]. Tan, X. Zhang, Z. Sun, and H. Zhang. Noisy iris image matching by using multiple cues. Pattern Recognition Letters, 33(8): , June [28] D. Woodard, S. Pundlik, P. Miller, and J. Lyle. Appearance-based periocular features in the context of face and non-ideal iris recognition. Signal, Image and Video Processing, 5(4): , [29] J. Xu, M. Cha, J. Heyman, S. Venugopalan, R. Abiantun, and M. Savvides. Robust local binary pattern feature sets for periocular biometric identification. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, pages 1 8, [30] L. Yunqi, J. Xutuan, S. Zhenxiang, C. Dongjie, and L. Qingmin. Face recognition method based on SURF feature. In Proceedings of the International Symposium on Computer Network and Multimedia Technology, pages 1 4, December [31] G. Zhang, X. Huang, S. Li, Y.Wang, and X.Wu. Boosting local binary pattern (LBP)-based face recognition. 28
7 In Advances in Biometric Person Authentication, volume 3338 of Lecture Notes in Computer Science, pages Springer, [32] M. Turk and A. Pentland. Eigenfaces for recognition. Journal of Cognitive Neurosicence, 3(1):71 86, BIOGRAPHY Nirgish Kumar is pursuing Ph.d Degree, From Faculity of Engineering, Rama University, Kanpur. His research interest fields include Biometric, Machine leaning, computational Intelligence, segmentation techniques, and Data mining. He has published more than 04 papers in various International Journals and Conferences. Presently he is working HBTU Kanpur. He is member of IEEE and paper Reviewers. 29
List of Publications for Thesis
List of Publications for Thesis Felix Juefei-Xu CyLab Biometrics Center, Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 15213, USA felixu@cmu.edu 1. Journal Publications
More informationSketch Matching for Crime Investigation using LFDA Framework
International Journal of Engineering and Technical Research (IJETR) Sketch Matching for Crime Investigation using LFDA Framework Anjali J. Pansare, Dr.V.C.Kotak, Babychen K. Mathew Abstract Here we are
More informationGlobal and Local Quality Measures for NIR Iris Video
Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu
More informationDistinguishing Identical Twins by Face Recognition
Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The
More informationFace Recognition Based Attendance System with Student Monitoring Using RFID Technology
Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Illumination Invariant Face Recognition Sailee Salkar 1, Kailash Sharma 2, Nikhil
More informationAn Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)
, pp.13-22 http://dx.doi.org/10.14257/ijmue.2015.10.8.02 An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) Anusha Alapati 1 and Dae-Seong Kang 1
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationImpact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function
Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Fang Hua 1, Peter Johnson 1, Nadezhda Sazonova 2, Paulo Lopez-Meyer 2, Stephanie Schuckers 1 1 ECE Department,
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationFace Detection System on Ada boost Algorithm Using Haar Classifiers
Vol.2, Issue.6, Nov-Dec. 2012 pp-3996-4000 ISSN: 2249-6645 Face Detection System on Ada boost Algorithm Using Haar Classifiers M. Gopi Krishna, A. Srinivasulu, Prof (Dr.) T.K.Basak 1, 2 Department of Electronics
More informationVEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL
VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationImproving Spectroface using Pre-processing and Voting Ricardo Santos Dept. Informatics, University of Beira Interior, Portugal
Improving Spectroface using Pre-processing and Voting Ricardo Santos Dept. Informatics, University of Beira Interior, Portugal Email: ricardo_psantos@hotmail.com Luís A. Alexandre Dept. Informatics, University
More informationPerformance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images
Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Keshav Thakur 1, Er Pooja Gupta 2,Dr.Kuldip Pahwa 3, 1,M.Tech Final Year Student, Deptt. of ECE, MMU Ambala,
More informationStudy Impact of Architectural Style and Partial View on Landmark Recognition
Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition
More informationEFFECTS OF SEVERE SIGNAL DEGRADATION ON EAR DETECTION. J. Wagner, A. Pflug, C. Rathgeb and C. Busch
EFFECTS OF SEVERE SIGNAL DEGRADATION ON EAR DETECTION J. Wagner, A. Pflug, C. Rathgeb and C. Busch da/sec Biometrics and Internet Security Research Group Hochschule Darmstadt, Darmstadt, Germany {johannes.wagner,anika.pflug,christian.rathgeb,christoph.busch}@cased.de
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationAn Un-awarely Collected Real World Face Database: The ISL-Door Face Database
An Un-awarely Collected Real World Face Database: The ISL-Door Face Database Hazım Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs (ISL), Universität Karlsruhe (TH), Am Fasanengarten 5, 76131
More informationAutocomplete Sketch Tool
Autocomplete Sketch Tool Sam Seifert, Georgia Institute of Technology Advanced Computer Vision Spring 2016 I. ABSTRACT This work details an application that can be used for sketch auto-completion. Sketch
More informationECC419 IMAGE PROCESSING
ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means
More informationMultimedia Forensics
Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer
More informationFacial Recognition of Identical Twins
Facial Recognition of Identical Twins Matthew T. Pruitt, Jason M. Grant, Jeffrey R. Paone, Patrick J. Flynn University of Notre Dame Notre Dame, IN {mpruitt, jgrant3, jpaone, flynn}@nd.edu Richard W. Vorder
More informationNear Infrared Face Image Quality Assessment System of Video Sequences
2011 Sixth International Conference on Image and Graphics Near Infrared Face Image Quality Assessment System of Video Sequences Jianfeng Long College of Electrical and Information Engineering Hunan University
More informationDUE to its many potential applications, face recognition has. Facial Deblur Inference using Subspace Analysis for Recognition of Blurred Faces
Facial Deblur Inference using Subspace Analysis for Recognition of Blurred Faces Masashi Nishiyama, Abdenour Hadid, Hidenori Takeshima, Jamie Shotton, Tatsuo Kozakaya, Osamu Yamaguchi Abstract This paper
More informationPredicting Eye Color from Near Infrared Iris Images
Predicting Eye Color from Near Infrared Iris Images Denton Bobeldyk 1,2 Arun Ross 1 denny@bobeldyk.org rossarun@cse.msu.edu 1 Michigan State University, East Lansing, USA 2 Davenport University, Grand
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationA Comparison Study of Image Descriptors on Low- Resolution Face Image Verification
A Comparison Study of Image Descriptors on Low- Resolution Face Image Verification Gittipat Jetsiktat, Sasipa Panthuwadeethorn and Suphakant Phimoltares Advanced Virtual and Intelligent Computing (AVIC)
More informationChapter 6 Face Recognition at a Distance: System Issues
Chapter 6 Face Recognition at a Distance: System Issues Meng Ao, Dong Yi, Zhen Lei, and Stan Z. Li Abstract Face recognition at a distance (FRAD) is one of the most challenging forms of face recognition
More informationIMPACT OF SEVERE SIGNAL DEGRADATION ON EAR RECOGNITION PERFORMANCE. A. Pflug, J. Wagner, C. Rathgeb and C. Busch
IMPACT OF SEVERE SIGNAL DEGRADATION ON EAR RECOGNITION PERFORMANCE A. Pflug, J. Wagner, C. Rathgeb and C. Busch da/sec Biometrics and Internet Security Research Group Hochschule Darmstadt, Darmstadt, Germany
More informationImproved SIFT Matching for Image Pairs with a Scale Difference
Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,
More informationBiometrics Final Project Report
Andres Uribe au2158 Introduction Biometrics Final Project Report Coin Counter The main objective for the project was to build a program that could count the coins money value in a picture. The work was
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationCurriculum Vitae. Computer Vision, Image Processing, Biometrics. Computer Vision, Vision Rehabilitation, Vision Science
Curriculum Vitae Date Prepared: 01/09/2016 (last updated: 09/12/2016) Name: Shrinivas J. Pundlik Education 07/2002 B.E. (Bachelor of Engineering) Electronics Engineering University of Pune, Pune, India
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationA Comparison of Histogram and Template Matching for Face Verification
A Comparison of and Template Matching for Face Verification Chidambaram Chidambaram Universidade do Estado de Santa Catarina chidambaram@udesc.br Marlon Subtil Marçal, Leyza Baldo Dorini, Hugo Vieira Neto
More informationBIOMETRIC IDENTIFICATION USING 3D FACE SCANS
BIOMETRIC IDENTIFICATION USING 3D FACE SCANS Chao Li Armando Barreto Craig Chin Jing Zhai Electrical and Computer Engineering Department Florida International University Miami, Florida, 33174, USA ABSTRACT
More informationMultimodal Face Recognition using Hybrid Correlation Filters
Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationAn Efficient Color Image Segmentation using Edge Detection and Thresholding Methods
19 An Efficient Color Image Segmentation using Edge Detection and Thresholding Methods T.Arunachalam* Post Graduate Student, P.G. Dept. of Computer Science, Govt Arts College, Melur - 625 106 Email-Arunac682@gmail.com
More informationAPPENDIX 1 TEXTURE IMAGE DATABASES
167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture
More informationInternational Journal of Innovative Research in Engineering Science and Technology APRIL 2018 ISSN X
HIGH DYNAMIC RANGE OF MULTISPECTRAL ACQUISITION USING SPATIAL IMAGES 1 M.Kavitha, M.Tech., 2 N.Kannan, M.E., and 3 S.Dharanya, M.E., 1 Assistant Professor/ CSE, Dhirajlal Gandhi College of Technology,
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationProcessing and Enhancement of Palm Vein Image in Vein Pattern Recognition System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More information3D Face Recognition in Biometrics
3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu
More informationFace Recognition System Based on Infrared Image
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 6, Issue 1 [October. 217] PP: 47-56 Face Recognition System Based on Infrared Image Yong Tang School of Electronics
More informationAdaptive Feature Analysis Based SAR Image Classification
I J C T A, 10(9), 2017, pp. 973-977 International Science Press ISSN: 0974-5572 Adaptive Feature Analysis Based SAR Image Classification Debabrata Samanta*, Abul Hasnat** and Mousumi Paul*** ABSTRACT SAR
More informationROBOT VISION. Dr.M.Madhavi, MED, MVSREC
ROBOT VISION Dr.M.Madhavi, MED, MVSREC Robotic vision may be defined as the process of acquiring and extracting information from images of 3-D world. Robotic vision is primarily targeted at manipulation
More informationMulti-PIE. Robotics Institute, Carnegie Mellon University 2. Department of Psychology, University of Pittsburgh 3
Multi-PIE Ralph Gross1, Iain Matthews1, Jeffrey Cohn2, Takeo Kanade1, Simon Baker3 1 Robotics Institute, Carnegie Mellon University 2 Department of Psychology, University of Pittsburgh 3 Microsoft Research,
More informationImage Enhancement using Histogram Equalization and Spatial Filtering
Image Enhancement using Histogram Equalization and Spatial Filtering Fari Muhammad Abubakar 1 1 Department of Electronics Engineering Tianjin University of Technology and Education (TUTE) Tianjin, P.R.
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationNON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT:
IJCE January-June 2012, Volume 4, Number 1 pp. 59 67 NON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT: A COMPARATIVE STUDY Prabhdeep Singh1 & A. K. Garg2
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationSCIENCE & TECHNOLOGY
Pertanika J. Sci. & Technol. 25 (S): 163-172 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Performance Comparison of Min-Max Normalisation on Frontal Face Detection Using
More informationRecent research results in iris biometrics
Recent research results in iris biometrics Karen Hollingsworth, Sarah Baker, Sarah Ring Kevin W. Bowyer, and Patrick J. Flynn Computer Science and Engineering Department, University of Notre Dame, Notre
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SMILE DETECTION WITH IMPROVED MISDETECTION RATE AND REDUCED FALSE ALARM RATE VRUSHALI
More informationNon-Uniform Motion Blur For Face Recognition
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 6 (June. 2018), V (IV) PP 46-52 www.iosrjen.org Non-Uniform Motion Blur For Face Recognition Durga Bhavani
More informationBackground. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image
Background Computer Vision & Digital Image Processing Introduction to Digital Image Processing Interest comes from two primary backgrounds Improvement of pictorial information for human perception How
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationGenetic Algorithm Based Recognizing Surgically Altered Face Images for Real Time Security Application
International Journal of Scientific and Research Publications, Volume 3, Issue 12, December 2013 1 Genetic Algorithm Based Recognizing Surgically Altered Face Images for Real Time Security Application
More informationSession 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)
Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation
More informationThe Effect of Image Resolution on the Performance of a Face Recognition System
The Effect of Image Resolution on the Performance of a Face Recognition System B.J. Boom, G.M. Beumer, L.J. Spreeuwers, R. N. J. Veldhuis Faculty of Electrical Engineering, Mathematics and Computer Science
More informationLocating the Query Block in a Source Document Image
Locating the Query Block in a Source Document Image Naveena M and G Hemanth Kumar Department of Studies in Computer Science, University of Mysore, Manasagangotri-570006, Mysore, INDIA. Abstract: - In automatic
More information8.2 IMAGE PROCESSING VERSUS IMAGE ANALYSIS Image processing: The collection of routines and
8.1 INTRODUCTION In this chapter, we will study and discuss some fundamental techniques for image processing and image analysis, with a few examples of routines developed for certain purposes. 8.2 IMAGE
More informationDepartment of Computer Science & Engineering Michigan State University December 10, 2010
Automatic Face Recognition: State of the Art Anil K. Jain Department of Computer Science & Engineering Michigan State University http://biometrics.cse.msu.edu December 10, 2010 Birth to Age 10 in 85 Seconds
More informationEC-433 Digital Image Processing
EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationUsing Fragile Bit Coincidence to Improve Iris Recognition
Using Fragile Bit Coincidence to Improve Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn Abstract The most common iris biometric algorithm represents the texture of an iris
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationPRACTICAL IMAGE AND VIDEO PROCESSING USING MATLAB
PRACTICAL IMAGE AND VIDEO PROCESSING USING MATLAB OGE MARQUES Florida Atlantic University *IEEE IEEE PRESS WWILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS LIST OF FIGURES LIST OF TABLES FOREWORD
More informationDr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Feature Based Analysis of Copy-Paste Image Tampering
More informationNFRAD: Near-Infrared Face Recognition at a Distance
NFRAD: Near-Infrared Face Recognition at a Distance Hyunju Maeng a, Hyun-Cheol Choi a, Unsang Park b, Seong-Whan Lee a and Anil K. Jain a,b a Dept. of Brain and Cognitive Eng. Korea Univ., Seoul, Korea
More informationOutdoor Face Recognition Using Enhanced Near Infrared Imaging
Outdoor Face Recognition Using Enhanced Near Infrared Imaging Dong Yi, Rong Liu, RuFeng Chu, Rui Wang, Dong Liu, and Stan Z. Li Center for Biometrics and Security Research & National Laboratory of Pattern
More informationThesis: Bio-Inspired Vision Model Implementation In Compressed Surveillance Videos by. Saman Poursoltan. Thesis submitted for the degree of
Thesis: Bio-Inspired Vision Model Implementation In Compressed Surveillance Videos by Saman Poursoltan Thesis submitted for the degree of Doctor of Philosophy in Electrical and Electronic Engineering University
More informationSYLLABUS CHAPTER - 2 : INTENSITY TRANSFORMATIONS. Some Basic Intensity Transformation Functions, Histogram Processing.
Contents i SYLLABUS UNIT - I CHAPTER - 1 : INTRODUCTION TO DIGITAL IMAGE PROCESSING Introduction, Origins of Digital Image Processing, Applications of Digital Image Processing, Fundamental Steps, Components,
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationA Proposal for Security Oversight at Automated Teller Machine System
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationEmpirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones
Empirical Evaluation of Visible Spectrum Iris versus Periocular Recognition in Unconstrained Scenario on Smartphones Kiran B. Raja * R. Raghavendra * Christoph Busch * * Norwegian Biometric Laboratory,
More informationUSE OF HISTOGRAM EQUALIZATION IN IMAGE PROCESSING FOR IMAGE ENHANCEMENT
USE OF HISTOGRAM EQUALIZATION IN IMAGE PROCESSING FOR IMAGE ENHANCEMENT Sapana S. Bagade M.E,Computer Engineering, Sipna s C.O.E.T,Amravati, Amravati,India sapana.bagade@gmail.com Vijaya K. Shandilya Assistant
More informationDetection of License Plates of Vehicles
13 W. K. I. L Wanniarachchi 1, D. U. J. Sonnadara 2 and M. K. Jayananda 2 1 Faculty of Science and Technology, Uva Wellassa University, Sri Lanka 2 Department of Physics, University of Colombo, Sri Lanka
More informationIllumination Invariant Face Recognition using Local Directional Number Pattern (LDN)
Illumination Invariant Face Recognition using Local Directional Number Pattern (LDN) Sailee R Salkar, Nikhil S Patankar, Rameshwar D Chintamani, Yogesh S Deshmukh Sanjivani K.B.P. Polytechnic Kopargaon
More informationSECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS
RADT 3463 - COMPUTERIZED IMAGING Section I: Chapter 2 RADT 3463 Computerized Imaging 1 SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS RADT 3463 COMPUTERIZED IMAGING Section I: Chapter 2 RADT
More informationDigital Image Processing
Digital Image Processing Part 2: Image Enhancement Digital Image Processing Course Introduction in the Spatial Domain Lecture AASS Learning Systems Lab, Teknik Room T26 achim.lilienthal@tech.oru.se Course
More informationMAV-ID card processing using camera images
EE 5359 MULTIMEDIA PROCESSING SPRING 2013 PROJECT PROPOSAL MAV-ID card processing using camera images Under guidance of DR K R RAO DEPARTMENT OF ELECTRICAL ENGINEERING UNIVERSITY OF TEXAS AT ARLINGTON
More informationSegmentation of Microscopic Bone Images
International Journal of Electronics Engineering, 2(1), 2010, pp. 11-15 Segmentation of Microscopic Bone Images Anand Jatti Research Scholar, Vishveshvaraiah Technological University, Belgaum, Karnataka
More informationReal Time Word to Picture Translation for Chinese Restaurant Menus
Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We
More informationExtraction and Recognition of Text From Digital English Comic Image Using Median Filter
Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com
More informationIMAGE ENHANCEMENT IN SPATIAL DOMAIN
A First Course in Machine Vision IMAGE ENHANCEMENT IN SPATIAL DOMAIN By: Ehsan Khoramshahi Definitions The principal objective of enhancement is to process an image so that the result is more suitable
More informationCOLOR IMAGE SEGMENTATION USING K-MEANS CLASSIFICATION ON RGB HISTOGRAM SADIA BASAR, AWAIS ADNAN, NAILA HABIB KHAN, SHAHAB HAIDER
COLOR IMAGE SEGMENTATION USING K-MEANS CLASSIFICATION ON RGB HISTOGRAM SADIA BASAR, AWAIS ADNAN, NAILA HABIB KHAN, SHAHAB HAIDER Department of Computer Science, Institute of Management Sciences, 1-A, Sector
More informationOn the Existence of Face Quality Measures
On the Existence of Face Quality Measures P. Jonathon Phillips J. Ross Beveridge David Bolme Bruce A. Draper, Geof H. Givens Yui Man Lui Su Cheng Mohammad Nayeem Teli Hao Zhang Abstract We investigate
More informationRecognition System for Pakistani Paper Currency
World Applied Sciences Journal 28 (12): 2069-2075, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.28.12.300 Recognition System for Pakistani Paper Currency 1 2 Ahmed Ali and
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationDetecting Resized Double JPEG Compressed Images Using Support Vector Machine
Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationA NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE
A NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE Vibekananda Dutta Dr.Nishtha Kesswani Deepti Gahalot Central University of Rajasthan Central University of Rajasthan Govt.Engineering
More informationFace detection, face alignment, and face image parsing
Lecture overview Face detection, face alignment, and face image parsing Brandon M. Smith Guest Lecturer, CS 534 Monday, October 21, 2013 Brief introduction to local features Face detection Face alignment
More information